CNC - Internet Security Risk Protection (Lesson)
Internet Security Risk Protection
Introduction
Now that we understand some of the terms of malware, how do we know if a computer is affected?
- Computer behavior that is not normal.
- Emails sent without your knowledge.
- Speed of computer or web browsers are slower than normal.
- Computer Processor Unit (CPU) has increased usage above what is normal.
- Computer freezes or crashes.
- Files have trouble opening, are changed, or can't be found.
- Extra icons, odd unknown files or programs.
- Programs, including browsers, are changed or reconfigured without your knowledge.
Firewall Protection
A firewall contributes automatic interception and notification for items coming in to your computer that may be an issue for security.
Review the firewall information in the learning items below. A firewall may be software or hardware, but is designed to check information from the web prior to you receiving it. In this manner a message can be displayed to the user indicating that the item coming in is suspect of having a security issue.
Blackhat vs. Whitehat Hackers
Blackhat computer hackers look for flaws in software to exploit them or break into computer for malicious purposes.
Whitehat computer hackers look for flaws in software to fix them or attempt to break into computers to audit their security. Some things a whitehat hacker might do:
- Analyze server software for flaws that could be exploited and recommend fixes.
- Analyze new viruses or malware to characterize what they are doing and to build patches.
- Audit the overall security of computer systems.
IMAGE CREATED BY GAVS AND USED ACCORDING TO TERMS OF USE.